Solaris 10 Security
This article discusses the many new security features in Sun's Solaris 10 operating system, as well as Sun's holistic approach to security. 2004-04-19 http://www.securityfocus.com/infocus/1776 Dogs of War: Securing Microsoft Groupware Environments with Unix (Part 2) This article discusses the implementation of layered mail security using Unix as an MTA in front of Microsoft groupware products. Part two describes the use of Qmail, Qmail-Scanner, Clam AntiVirus and SpamAssassin. 2004-04-05 http://www.securityfocus.com/infocus/1772 Dogs of War: Securing Microsoft Groupware Environments with Unix (Part One) This article discusses the implementation of layered mail security using Unix as MTA in front of Microsoft groupware products. Part one describes the use of Sendmail, MIMEDefang and SpamAssassin. 2004-03-26 http://www.securityfocus.com/infocus/1770 Oracle Row Level Security: Part 2 This paper explores the row level security feature added to Oracle 8i and above, and provides examples. One of the main uses of row level security is to allow all of a company's data to be stored in one database for different departments, or for a hosting company to store data for different companies in one database. Part Two. 2003-11-17 http://www.securityfocus.com/infocus/1744 Oracle Row Level Security: Part 1 This paper explores the row level security feature added to Oracle 8i and above, and provides examples. One of the main uses of row level security is to allow all of a company's data to be stored in one database for different departments, or for a hosting company to store data for different companies in one database. Part One. 2003-11-07 http://www.securityfocus.com/infocus/1743 Web Security Appliance With Apache and mod_security This article will demonstrate how you can build your own application gateway with little effort, using open source components that are widely available. 2003-10-21 http://www.securityfocus.com/infocus/1739 Securing MySQL: step-by-step This article describes the basic steps which should be performed in order to secure a MySQL database against both local and remote attacks. 2003-08-28 http://www.securityfocus.com/infocus/1726 Detecting SQL Injection in Oracle This paper takes the subject of SQL injection further and investigates the possibilities for the Oracle Database Administrator to detect SQL injection in the wild. 2003-07-22 http://www.securityfocus.com/infocus/1714 Securing PHP: Step-by-Step This article shows the basic steps in securing PHP, one of the most popular scripting languages used to create dynamic web pages on the Internet. 2003-06-23 http://www.securityfocus.com/infocus/1706 Securing Apache: Step-by-Step This article shows in a step-by-step fashion, how to install and configure the Apache 1.3.x Web server in order to mitigate or avoid successful break-in when new vulnerabilities in this software are found. 2003-05-14 http://www.securityfocus.com/infocus/1694 |
|
Privacy Statement |